flaskBlog is a blog app built with Flask. In 2.8.0 and earlier, the code checks if the userRole is "admin" only when visiting the /admin page, but not when visiting its subroutes. Specifically, only the file routes/adminPanel.py checks the user role when a user is trying to access the admin page, but that control is not done for the pages routes/adminPanelComments.py and routes/adminPanelPosts.py. Thus, an unauthorized user can bypass the intended restrictions, leaking sensitive data and accessing the following pages: /admin/posts, /adminpanel/posts, /admin/comments, and /adminpanel/comments.
References
Link | Resource |
---|---|
https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-h239-vv39-v3vx | Exploit Third Party Advisory |
https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-jw79-2xvp-76p8 | Exploit Third Party Advisory |
Configurations
History
22 Aug 2025, 20:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-h239-vv39-v3vx - Exploit, Third Party Advisory | |
References | () https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-jw79-2xvp-76p8 - Exploit, Third Party Advisory | |
First Time |
Dogukanurker
Dogukanurker flaskblog |
|
CPE | cpe:2.3:a:dogukanurker:flaskblog:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
20 Aug 2025, 14:40
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Aug 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-19 19:15
Updated : 2025-08-22 20:58
NVD link : CVE-2025-55734
Mitre link : CVE-2025-55734
CVE.ORG link : CVE-2025-55734
JSON object : View
Products Affected
dogukanurker
- flaskblog
CWE
CWE-862
Missing Authorization